sctp: fix to send FORWARD-TSN chunk only if peer has such capable
[linux-2.6] / net / xfrm / xfrm_ipcomp.c
1 /*
2  * IP Payload Compression Protocol (IPComp) - RFC3173.
3  *
4  * Copyright (c) 2003 James Morris <jmorris@intercode.com.au>
5  * Copyright (c) 2003-2008 Herbert Xu <herbert@gondor.apana.org.au>
6  *
7  * This program is free software; you can redistribute it and/or modify it
8  * under the terms of the GNU General Public License as published by the Free
9  * Software Foundation; either version 2 of the License, or (at your option)
10  * any later version.
11  *
12  * Todo:
13  *   - Tunable compression parameters.
14  *   - Compression stats.
15  *   - Adaptive compression.
16  */
17
18 #include <linux/crypto.h>
19 #include <linux/err.h>
20 #include <linux/gfp.h>
21 #include <linux/list.h>
22 #include <linux/module.h>
23 #include <linux/mutex.h>
24 #include <linux/percpu.h>
25 #include <linux/smp.h>
26 #include <linux/vmalloc.h>
27 #include <net/ip.h>
28 #include <net/ipcomp.h>
29 #include <net/xfrm.h>
30
31 struct ipcomp_tfms {
32         struct list_head list;
33         struct crypto_comp **tfms;
34         int users;
35 };
36
37 static DEFINE_MUTEX(ipcomp_resource_mutex);
38 static void **ipcomp_scratches;
39 static int ipcomp_scratch_users;
40 static LIST_HEAD(ipcomp_tfms_list);
41
42 static int ipcomp_decompress(struct xfrm_state *x, struct sk_buff *skb)
43 {
44         struct ipcomp_data *ipcd = x->data;
45         const int plen = skb->len;
46         int dlen = IPCOMP_SCRATCH_SIZE;
47         const u8 *start = skb->data;
48         const int cpu = get_cpu();
49         u8 *scratch = *per_cpu_ptr(ipcomp_scratches, cpu);
50         struct crypto_comp *tfm = *per_cpu_ptr(ipcd->tfms, cpu);
51         int err = crypto_comp_decompress(tfm, start, plen, scratch, &dlen);
52         int len;
53
54         if (err)
55                 goto out;
56
57         if (dlen < (plen + sizeof(struct ip_comp_hdr))) {
58                 err = -EINVAL;
59                 goto out;
60         }
61
62         len = dlen - plen;
63         if (len > skb_tailroom(skb))
64                 len = skb_tailroom(skb);
65
66         __skb_put(skb, len);
67
68         len += plen;
69         skb_copy_to_linear_data(skb, scratch, len);
70
71         while ((scratch += len, dlen -= len) > 0) {
72                 skb_frag_t *frag;
73
74                 err = -EMSGSIZE;
75                 if (WARN_ON(skb_shinfo(skb)->nr_frags >= MAX_SKB_FRAGS))
76                         goto out;
77
78                 frag = skb_shinfo(skb)->frags + skb_shinfo(skb)->nr_frags;
79                 frag->page = alloc_page(GFP_ATOMIC);
80
81                 err = -ENOMEM;
82                 if (!frag->page)
83                         goto out;
84
85                 len = PAGE_SIZE;
86                 if (dlen < len)
87                         len = dlen;
88
89                 memcpy(page_address(frag->page), scratch, len);
90
91                 frag->page_offset = 0;
92                 frag->size = len;
93                 skb->truesize += len;
94                 skb->data_len += len;
95                 skb->len += len;
96
97                 skb_shinfo(skb)->nr_frags++;
98         }
99
100         err = 0;
101
102 out:
103         put_cpu();
104         return err;
105 }
106
107 int ipcomp_input(struct xfrm_state *x, struct sk_buff *skb)
108 {
109         int nexthdr;
110         int err = -ENOMEM;
111         struct ip_comp_hdr *ipch;
112
113         if (skb_linearize_cow(skb))
114                 goto out;
115
116         skb->ip_summed = CHECKSUM_NONE;
117
118         /* Remove ipcomp header and decompress original payload */
119         ipch = (void *)skb->data;
120         nexthdr = ipch->nexthdr;
121
122         skb->transport_header = skb->network_header + sizeof(*ipch);
123         __skb_pull(skb, sizeof(*ipch));
124         err = ipcomp_decompress(x, skb);
125         if (err)
126                 goto out;
127
128         err = nexthdr;
129
130 out:
131         return err;
132 }
133 EXPORT_SYMBOL_GPL(ipcomp_input);
134
135 static int ipcomp_compress(struct xfrm_state *x, struct sk_buff *skb)
136 {
137         struct ipcomp_data *ipcd = x->data;
138         const int plen = skb->len;
139         int dlen = IPCOMP_SCRATCH_SIZE;
140         u8 *start = skb->data;
141         const int cpu = get_cpu();
142         u8 *scratch = *per_cpu_ptr(ipcomp_scratches, cpu);
143         struct crypto_comp *tfm = *per_cpu_ptr(ipcd->tfms, cpu);
144         int err;
145
146         local_bh_disable();
147         err = crypto_comp_compress(tfm, start, plen, scratch, &dlen);
148         local_bh_enable();
149         if (err)
150                 goto out;
151
152         if ((dlen + sizeof(struct ip_comp_hdr)) >= plen) {
153                 err = -EMSGSIZE;
154                 goto out;
155         }
156
157         memcpy(start + sizeof(struct ip_comp_hdr), scratch, dlen);
158         put_cpu();
159
160         pskb_trim(skb, dlen + sizeof(struct ip_comp_hdr));
161         return 0;
162
163 out:
164         put_cpu();
165         return err;
166 }
167
168 int ipcomp_output(struct xfrm_state *x, struct sk_buff *skb)
169 {
170         int err;
171         struct ip_comp_hdr *ipch;
172         struct ipcomp_data *ipcd = x->data;
173
174         if (skb->len < ipcd->threshold) {
175                 /* Don't bother compressing */
176                 goto out_ok;
177         }
178
179         if (skb_linearize_cow(skb))
180                 goto out_ok;
181
182         err = ipcomp_compress(x, skb);
183
184         if (err) {
185                 goto out_ok;
186         }
187
188         /* Install ipcomp header, convert into ipcomp datagram. */
189         ipch = ip_comp_hdr(skb);
190         ipch->nexthdr = *skb_mac_header(skb);
191         ipch->flags = 0;
192         ipch->cpi = htons((u16 )ntohl(x->id.spi));
193         *skb_mac_header(skb) = IPPROTO_COMP;
194 out_ok:
195         skb_push(skb, -skb_network_offset(skb));
196         return 0;
197 }
198 EXPORT_SYMBOL_GPL(ipcomp_output);
199
200 static void ipcomp_free_scratches(void)
201 {
202         int i;
203         void **scratches;
204
205         if (--ipcomp_scratch_users)
206                 return;
207
208         scratches = ipcomp_scratches;
209         if (!scratches)
210                 return;
211
212         for_each_possible_cpu(i)
213                 vfree(*per_cpu_ptr(scratches, i));
214
215         free_percpu(scratches);
216 }
217
218 static void **ipcomp_alloc_scratches(void)
219 {
220         int i;
221         void **scratches;
222
223         if (ipcomp_scratch_users++)
224                 return ipcomp_scratches;
225
226         scratches = alloc_percpu(void *);
227         if (!scratches)
228                 return NULL;
229
230         ipcomp_scratches = scratches;
231
232         for_each_possible_cpu(i) {
233                 void *scratch = vmalloc(IPCOMP_SCRATCH_SIZE);
234                 if (!scratch)
235                         return NULL;
236                 *per_cpu_ptr(scratches, i) = scratch;
237         }
238
239         return scratches;
240 }
241
242 static void ipcomp_free_tfms(struct crypto_comp **tfms)
243 {
244         struct ipcomp_tfms *pos;
245         int cpu;
246
247         list_for_each_entry(pos, &ipcomp_tfms_list, list) {
248                 if (pos->tfms == tfms)
249                         break;
250         }
251
252         WARN_ON(!pos);
253
254         if (--pos->users)
255                 return;
256
257         list_del(&pos->list);
258         kfree(pos);
259
260         if (!tfms)
261                 return;
262
263         for_each_possible_cpu(cpu) {
264                 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu);
265                 crypto_free_comp(tfm);
266         }
267         free_percpu(tfms);
268 }
269
270 static struct crypto_comp **ipcomp_alloc_tfms(const char *alg_name)
271 {
272         struct ipcomp_tfms *pos;
273         struct crypto_comp **tfms;
274         int cpu;
275
276         /* This can be any valid CPU ID so we don't need locking. */
277         cpu = raw_smp_processor_id();
278
279         list_for_each_entry(pos, &ipcomp_tfms_list, list) {
280                 struct crypto_comp *tfm;
281
282                 tfms = pos->tfms;
283                 tfm = *per_cpu_ptr(tfms, cpu);
284
285                 if (!strcmp(crypto_comp_name(tfm), alg_name)) {
286                         pos->users++;
287                         return tfms;
288                 }
289         }
290
291         pos = kmalloc(sizeof(*pos), GFP_KERNEL);
292         if (!pos)
293                 return NULL;
294
295         pos->users = 1;
296         INIT_LIST_HEAD(&pos->list);
297         list_add(&pos->list, &ipcomp_tfms_list);
298
299         pos->tfms = tfms = alloc_percpu(struct crypto_comp *);
300         if (!tfms)
301                 goto error;
302
303         for_each_possible_cpu(cpu) {
304                 struct crypto_comp *tfm = crypto_alloc_comp(alg_name, 0,
305                                                             CRYPTO_ALG_ASYNC);
306                 if (IS_ERR(tfm))
307                         goto error;
308                 *per_cpu_ptr(tfms, cpu) = tfm;
309         }
310
311         return tfms;
312
313 error:
314         ipcomp_free_tfms(tfms);
315         return NULL;
316 }
317
318 static void ipcomp_free_data(struct ipcomp_data *ipcd)
319 {
320         if (ipcd->tfms)
321                 ipcomp_free_tfms(ipcd->tfms);
322         ipcomp_free_scratches();
323 }
324
325 void ipcomp_destroy(struct xfrm_state *x)
326 {
327         struct ipcomp_data *ipcd = x->data;
328         if (!ipcd)
329                 return;
330         xfrm_state_delete_tunnel(x);
331         mutex_lock(&ipcomp_resource_mutex);
332         ipcomp_free_data(ipcd);
333         mutex_unlock(&ipcomp_resource_mutex);
334         kfree(ipcd);
335 }
336 EXPORT_SYMBOL_GPL(ipcomp_destroy);
337
338 int ipcomp_init_state(struct xfrm_state *x)
339 {
340         int err;
341         struct ipcomp_data *ipcd;
342         struct xfrm_algo_desc *calg_desc;
343
344         err = -EINVAL;
345         if (!x->calg)
346                 goto out;
347
348         if (x->encap)
349                 goto out;
350
351         err = -ENOMEM;
352         ipcd = kzalloc(sizeof(*ipcd), GFP_KERNEL);
353         if (!ipcd)
354                 goto out;
355
356         mutex_lock(&ipcomp_resource_mutex);
357         if (!ipcomp_alloc_scratches())
358                 goto error;
359
360         ipcd->tfms = ipcomp_alloc_tfms(x->calg->alg_name);
361         if (!ipcd->tfms)
362                 goto error;
363         mutex_unlock(&ipcomp_resource_mutex);
364
365         calg_desc = xfrm_calg_get_byname(x->calg->alg_name, 0);
366         BUG_ON(!calg_desc);
367         ipcd->threshold = calg_desc->uinfo.comp.threshold;
368         x->data = ipcd;
369         err = 0;
370 out:
371         return err;
372
373 error:
374         ipcomp_free_data(ipcd);
375         mutex_unlock(&ipcomp_resource_mutex);
376         kfree(ipcd);
377         goto out;
378 }
379 EXPORT_SYMBOL_GPL(ipcomp_init_state);
380
381 MODULE_LICENSE("GPL");
382 MODULE_DESCRIPTION("IP Payload Compression Protocol (IPComp) - RFC3173");
383 MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");